Filters








23,871 Hits in 6.4 sec

Group-Based Privacy Preservation Techniques for Process Mining [article]

Majid Rafiei, Wil M.P. van der Aalst
2021 arXiv   pre-print
We provide formal definitions of attack models and introduce an effective group-based privacy preservation technique for process mining.  ...  We also compare this approach with other group-based approaches for privacy-preserving event data publishing.  ...  We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
arXiv:2105.11983v1 fatcat:ctxjg2evufgbjc6k73zv3zlwci

Group-based privacy preservation techniques for process mining

Majid Rafiei, Wil M.P. van der Aalst
2021 Data & Knowledge Engineering  
We provide formal definitions of attack models and introduce an effective group-based privacy preservation technique for process mining.  ...  We also compare this approach with other group-based approaches for privacy-preserving event data publishing.  ...  We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
doi:10.1016/j.datak.2021.101908 fatcat:oedeqwmj4nebbm3tlyoh3nzf6e

A review on Privacy Preservation and Collaborative Data Mining

Amit Kumar
2015 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
In consequence of all these method some data mining technique is used. The data mining technique provide Varity of algorithm for privacy preservation.  ...  In this paper presents the review of privacy persevering technique used data mining.  ...  The data mining approach provide the Varity of algorithm for the process of privacy preservation technique.  ... 
doi:10.24297/ijct.v14i12.1777 fatcat:bzud5js4ljgr3bfifvcifl4h3q

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining [article]

Majid Rafiei, Wil M. P. van der Aalst
2020 arXiv   pre-print
In this paper, we introduce a Python-based infrastructure implementing state-of-the-art privacy preservation techniques in process mining.  ...  Our infrastructure manages both standard and non-standard event data resulting from privacy preservation techniques.  ...  The T LKC-privacy module implements the T LKC-privacy model for process mining [8] that provides group-based privacy guarantees assuming four types of background knowledge: set, multiset, sequence, and  ... 
arXiv:2009.11542v1 fatcat:vi2c6rda75hx3pmzgcawao4xbi

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining

Majid Rafiei, Wil M. P. van der Aalst
2020 CEUR Workshop Proceedings  
In this paper, we introduce a Pythonbased infrastructure implementing state-of-the-art privacy preservation techniques in process mining.  ...  Our infrastructure manages both standard and nonstandard event data resulting from privacy preservation techniques.  ...  The T LKC-privacy module implements the T LKC-privacy model for process mining [8] that provides group-based privacy guarantees assuming four types of background knowledge: set, multiset, sequence, and  ... 
doi:10.18154/rwth-2020-11373 fatcat:ejdvcw4fcfakjih3m3ymrtte4e

Prototype of Clustering and Classification Model for Privacy Preservation using Single Vector Decomposition

Richa Lodhi, Anil Suryavanshi
2016 International Journal of Computer Applications  
The single value decomposition technique divides the data of different parties during the process of privacy preservation.  ...  The combined process of clustering and classification called prototype mode for sharing privacy preservation.  ...  The data mining technique offers various algorithms for the process of privacy preservation. Association rule mining play an important role in privacy preservation.  ... 
doi:10.5120/ijca2016908064 fatcat:vxoyw6ewq5hyxnpb4pohhynqne

Privacy Preserving Data Mining Based on Geometrical Data Transformation Method (GDTM) and K-Means Clustering Algorithm

Nur Athirah Jamadi, Maheyzah Md Siraj, Mazura Mat Din, Hazinah Kutty Mammy, Norafida Ithnin
2018 International Journal of Innovative Computing  
We also propose an improved PPDM that applying Geometrical Data Transformation Method (GDTM) and K-Means Clustering Algorithm for optimum accuracy of mining and zero data loss while preserving the privacy  ...  Such problems motivate the research in Privacy Preserving Data Mining (PPDM) and it became one of the newest trends.  ...  Based on the privacy preservation techniques used, data mining process can be applied as a proceeding process.  ... 
doi:10.11113/ijic.v8n2.174 fatcat:3icxbhdwxrgslcokgf5pbkqb44

An Improved Rotation-Based Privacy Preserving Classification in Web Mining Using Naïve Bayes Classifier

Subramanian SANGEETHA MARIAMMAL, Ashok KAVITHAMANI
2020 Studies in Informatics and Control  
Web mining is the application of data mining techniques for mining the web data.  ...  Various conventional techniques are used for privacy preservation like condensation, randomization and tree structure etc.  ...  By surveying the privacy preserving techniques, the data mining-based models are graphically illustrated in Figure 1 .  ... 
doi:10.24846/v30i4y202004 fatcat:bth7sdt6rjg2tigp7xboclec2e

A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining

Aniket Patel, Dept. of IT, Silver Oak College of Engineering and Technology (GTU), Ahmedabad, India, Dept. of CE, Silver Oak College of Engineering and Technology (GTU), Ahmedabad, India, Dept. of CE, UV Patel College of Engineering(GTU), Kherva-Mehsana, India, Patel Shreya, Kiran Amin
2017 International Journal of Scientific Research in Computer Sciences and Engineering  
Such troubles prompted the advancement of Privacy Preserving Data Mining (PPDM) Techniques. Privacy Preserving has become an important issue in the development progress of Data Mining techniques.  ...  When the data becomes massive in volume, many problems strike for security and privacy breach.  ...  There are many different approaches based in Privacy Preserving in Data Mining basically the techniques are divided into three major groups such as Heuristic based approach, Reconstruction based approach  ... 
doi:10.26438/ijsrcse/v5i5.2125 fatcat:r4wtxwedwjd2dirwsip7qhp3ea

Multigroup Classification using Privacy Preserving Data Mining

2019 International Journal of Engineering and Advanced Technology  
One group, two group and three group's techniques used to preserve the data  ...  For different groups data should randomize differently. Based on this multiple groups the decision tree used to classify the data.  ...  Privacy preserving data mining use for solve this problem change the original data there are many privacy preserving techniques are used.  ... 
doi:10.35940/ijeat.f1174.0886s19 fatcat:zkktvwbbo5f75bmqj26xpbeoly

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining [article]

Majid Rafiei, Alexander Schnitzler, Wil M.P. van der Aalst
2021 arXiv   pre-print
In this paper, we present a Python-based infrastructure implementing and integrating state-of-the-art privacy/confidentiality preservation techniques in process mining.  ...  Our tool provides an easy-to-use web-based user interface for privacy-preserving data publishing, risk analysis, and data utility analysis.  ...  We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
arXiv:2107.14499v1 fatcat:yhjdgxvw2fcbdbephtcjg44myu

PSO-Enabled Privacy Preservation of Data Clustering

G. Asha Kiran, S. Srinivasa Suresh, Manimala Puri
2017 Indian Journal of Science and Technology  
Findings: The performance of the proposed clustering technique based on privacy preserving is analyzed for accuracy and Database Different Ratio (DBDR) on six UCI medical related data sets namely Hugerian  ...  The current paper highlights Particle Swam Optimization algorithm along with Fuzzy C-means clustering algorithm technique for preserving the privacy on distributed databases.  ...  Together with this a filtering based encryption technique was used for the purpose of privacy preservation while clustering the input medical data.  ... 
doi:10.17485/ijst/2017/v10i11/89318 fatcat:5lrr5pqegff2bd455rrqmwzu5a

Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework [article]

MohammadReza Keyvanpour (Department of Computer Engineering Al-Zahra University), Somayyeh Seifi Moradi (Department of Computer Engineering Islamic Azad University)
2011 arXiv   pre-print
This paper presents a Data modification- based Framework for classification and evaluation of the privacy preserving data mining techniques.  ...  The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining.  ...  This paper attempts to provide a good basis for classification and more accurate evaluation of data modification-based techniques for Privacy Preserving Data Mining.  ... 
arXiv:1105.1945v1 fatcat:e76tpeopyrdwlfvhgojdx6iuva

A Brief Survey on Privacy Preserving Techniques in Data Mining

Vinoth kumar J, Santhi V
2016 IOSR Journal of Computer Engineering  
In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security.  ...  The capability of privacy preserving data mining techniques is measured by using metrics such as performance in terms of time efficiency, data utility and level of uncertainty or resistance to data mining  ...  Section 4 discusses various existing privacy-preserving approaches for data mining. Section 5 deals with evaluation criteria for privacy preserving techniques.  ... 
doi:10.9790/0661-1804054751 fatcat:z2fi6ujibfg5nc453j3z7wkxne

A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining [chapter]

J. Indumathi
2012 Data Mining Applications in Engineering and Medicine  
(PPDM) Modus Operandi for optimized privacy preserving data mining.  ...  a family of privacy-preserving data mining (PPDM) methods using the technique selector.  ... 
doi:10.5772/49982 fatcat:di63yjpsdbhwvg5vh2k6vny2ti
« Previous Showing results 1 — 15 out of 23,871 results